Halaman

    Social Items

Showing posts with label phone. Show all posts
Showing posts with label phone. Show all posts
SD card types
SD card format



The full form of SD card is Secure digital card it is a nonvolatile (After the turn OFF the device the storage data is not deleted) memory which is used to save our file, videos, audio and other data, there are different types of SD card available on the market and prise of these cards are different according to their property

So in this article, we know that how many types of SD card exist and why two same SD card available on different prices and how to we choose the best SD card for our device because there are many variant are available of SD in the shop

Types of SD card


There are mainly three types of SD cards which are given as below
(1) SDSC
(2) SDHC
(3) SDXC

(1) SDSC (Secure digital standard capacity)


This memory card is made for the normal uses we found this the memory card in the mobile phones, these memories are cheaper than other memory and the storage capacity of this memory is lies between 128MB to 4GB

(2) SDHC (Secure digital high capacity)


This is another type of SD card this memory card is widely used, we use this memory in our mobile phone this SD card is more expensive than SDSC card, the storage range of this memory is lies between 4GB to 32GB

(3) SDXC (secure digital extended capacity)


These memories are used in the high definition camera or another high storages devices, these memories are not made for the mobile phone because the storage capacity of this memory card is more than other memory these memories are more expensive with respect to SDSC, SDHC memory card, the storage capacity of this SD card is lies between 64GB to 2TB

Classes of SD card


When we transfer file from SD card to another device then the speed of data transferring differs from other memory this difference is due to memory constriction and quality so to see all detail about the memory we classified this SD card into different classes which are given as below.

Classes                                 Speed
2                                              2mbps
4                                              4mbps
6                                              6mbps
8                                              8mbps
10                                           10mbps
UHS-1                                   100+ Mbps
USH-2                                   300+ Mbps
UHS-3                                   600+ Mbps

SD card recovery


If we delete some file unfortunately from the SD card then we recover these file from the SD card to doing these process we need software which are easily available

To recover the SD card, first of all, we download a software which name is Recover it, To install this the software in our PC go to any browser such as Google and type recover it after this process there are many site list are shown but we click on the first link and download the software according to our operating system

After the downloading process, we install this software in our PC, the installation process can take some time it depends on the internet quality so takes patient, after the installation process of the software we just open this recover it software and choose those option which we want to do with the help of this software

But in this article, I will talk you to recover the SD card so click on the recover SD card but before the clicking on this option we plug that SD card on the PC which we want to recover it so, first of all, check the recover device is connected to the PC

After the checking the SD card we click on the recover SD card option and choose SD card from the drive after selecting the SD card we click on the start now option so the scanning process of the SD card is starts now and it scans all those which are deleted from the SD card the scanning process can take some time so take patient

After the scanning process, it shows all the file list which are deleted from the SD car so our desire we choose the file and recover the file which is deleted from the memory after this process the deleted file are recover in our device and we can use this file






What are SD card formatter and recovery?

How to increase mobile phone or computer speed


How to increase mobile phone or computer speed
Internet speed

Slow internet speed is one of the most common things on the different devices this low speed is due to a software issue or hardware issues, But in this article, we talk about the software issues only because the hardware issues of the device are not prepared by the common people so in this article we are know what are we doing to improve device performance.





(1) Disable starts programs


There are many program run in the background in our device, if the number of the running programs is more than it will impact on the device and our device is not working properly because when more program run in the background than it consumes more resources so our device is slow down

So to overcome this difficulty we disable the background apps or programs and after this process our device resources are less using so we can see that our device work fast

In the mobile phone, we can easily disable background apps or programs but this disable are not easy in the PC so to disable background apps or programs in the PC we follow these steps

First of all press the Ctrl+Alt+Delete Button after this a new page will be open here we click on the Start up option then after this process all the programs or apps which run in the background are shown here so we can disable the apps and improve device performance.

(2) Synchronization


The synchronization process is very common for this device due to this process, our device data are store on online if we don’t want to save our data online than we can disable this feature than no data of the device is being stored on the online

Due to the synchronization process, it consumes our internet data so our device are being slow so to overcome this difficulty we can disable this feature and increase the internet speed on the device, to disable this feature go to the google account setting and here the disable feature of the synchronization are available so after disable our internet data less consume and we found that our device works fast

(3) Disable Animation and visual graphics


If our device did not support high graphics or high animation then we cannot run these programs because if we run these high graphics app then the load on the device is increased and this may be harmful to our device so we run only those apps or programs which are supporting in our device

(4) Windows update


In our laptop or PC after the sometimes interval windows, the update is coming the size of the update some time is bigger and if we not update the system than it updates in the background and consume our internet data in the background

If we do not want to update the device then we can disable it and after this process, our device performance will be increased and it works better than before to disable the update feature in the device first of all press the button widows+R and than a new page will be open here we type services.msc after this step a new page will open here we search windows update option and disable the windows update feature

(5) Stop notification


In our device, there are a large number of apps or software are installed and all these apps or software give the notification according to the condition, and after some time interval if any update of the application is come then they give us notification in the top navigation bar

All the notification of the apps consume some amount of internet so this notification impact on the internet speed so if these notification is not important for us than we can disable it and improve the device internet speed because many time we get a large amount of notification at the same time and this time a very large amount of devices are used so our the device is not quickly response at that time so to overcome this problem we disable unwanted notification

(6) Clean storage 


If the space of our device is totally filled than some of the apps are not working properly due to low storage because when apps are running on the devices than it expands and consumes more resources some time our devices storages are filled with caches data and cookies data these data are important for device performance but if the size of the caches data or cookies are are more than limited level than it will be harmful foe our device and decrease the internet speed of the device


Internet speed increasing tips

Cyber security news
Cyber security



There are a large number of data is transferred through the internet so we need a security system which saves our data from a hacker, these a person which save our data from hackers and improve the cybersecurity of our the system is called analyst

The salary of the cybersecurity analyst depends on their qualification and on their skill but according to the expert the salary of the cybersecurity analyses are lies between 5-6 lack

Cybersecurity jobs


There are many different types of jobs that are available in the cybersecurity but in this article, we talk about only those jobs which are highly requirements and the salary of these jobs are high, most of the person prefer these jobs, in the below of the article we explain some jobs category in the cybersecurity so according to your interest you can choose anyone

Information security analyst


If you want to make an information security analyst of any the company then, first of all, you have a bachelor degree in computer science, under this job, you have to do to analyze the network of the company and provide the security of all the system the salary of the security analyst is 5-6 lack
 There are many hackers who wanted to steal to private data of the company and use this information for our profit so to secure our networking system we need a person which provided security to our networking these people are a security analyst which prevent the hacker and secure our personal data

Software security engineering


To make a software security engineer in any company first of all we need a bachelor degree in computer science, software engineering, etc the salary of the software security engineering is 7-8 lack
Under this job, we have done to provide the development of software because when we use computers for a long time there are many bugs and other malware are installed so to solve this problem we need software so we can just create and solve this problem easily

We can do another work in the software security engineering such as software planning, if we want to improve our services then we take up update day today so we need to plan the software and according to the requirement we just create and take in use to secure our system

Another part of the software security engineering is development of the software because without the software we can to analyze the data of the company and not generate the reports to improve our services so day to day we need some new programs and software to analyze the data because if the quantity of the data is more than it is not handled by the people so we need software the developer which make software and provide the security to our system

Chief information security officer (CISO)


If we select for the post of CISO we have to do many work in the job which is discussed as below, for this job we need a qualification which is a Bachelor degree from computer science, cybersecurity degree and the master degree in computer science

There are many qualifications that are required to make a CISO, we can not gain this CISO job directly, after working on many posts in the company we can promote to this job in the company for this job the IT security information is required compulsory, the salary of this job lies 12-80 lack.

Security Architect


This job is one of the most important jobs in any networking world because these people find the weakness of the network and give their solution, to check the security of the system this security architect attack on the system legally and find the holes in the system

In the networking, not any system which is fully anti-hack but these security Architects make the system is nearly unhackable but in the reality no any system exist which are full anti-hack
If we want to make a security architect then there are some qualification is required which is a bachelor degree in computer science, master degree compulsory in the cybersecurity or computer science the salary are provided for this job is 15-20 lack

After the joining of this job, there are many works are doing such as how to use a VPN for our security and how to use a firewall to protect our system

Penetration Tester


This is also a type of security architect the working process of both people are nearly the same, in the penetration tester jobs people find to system weakness and find their best solution, to doing this work a group of people is required which working on a different topic on this work to analyze the all system the salary of this job is 5-10 lack and the qualification are required master in computer science






Cybersecurity Analyst salary and job salary

What is the Hub?

Hub and switch in networking
Hub in networking


Hub is an electronic device which helps us to connect multiple the device from a single server, this is a star topology based technology and if and the device is corrupt which is connected to this hub then there is no impact on the other devices which is connected to this hub device.

Types of Hub


There are mainly three types of Hub which are given as below

(a) Active Hub


These type of hubs regenerate the signal, amplifying the signal and forward the signal so to doing this process it consumes the electricity

(b) Passive Hub


These hubs do not regenerate the signal, not amplifying the signal and not forward the signal the transfer the input data on their normal a condition so for working of this hub there are no any electricity is required

(c) Intelligent Hub


These Hubs are made to do some spatial work, these hubs control the unwanted traffic on the system so the quality of the network is increase and we do our work fast

Working of Hub


When a signal comes on the Hub from the large distance then the quality of the signal is reduced and if we do not bring this signal to their normal condition then we cannot use this signal for our purpose so we use Hub in our networking, this Hub regenerate (Improve signal quality) the signal and make it usable

The input signal on the hub is weak so this hub first of all amplifying this signal and then forward to the next destination but when the hub forward this signal to another device than an error has come on the network these problems are discussed below

There are many computers that are connected to the hub so when we forward and data to the particular computer then this signal is forwarded to all the computers which is connected to this Hub so this is one of the biggest reason most of the organization company did not prefer this hub because they have another best alternative of this Hub devices so at the present time this hub does not use, there are many advance device gives the best experience with respect to this hub

Advantages and disadvantage of the Hub


(1) It is a multiple port electronic device so there are many devices are attached to it
(2) This hub is not saved the data
(3) When this hub forwards the data then is send unwanted data to another computer
(4) When we transfer data with the help of the hub then one port is used for input data and another is used for output data we cannot send or receive data at the same time with the help of computer
(5) Hub is a half-duplex device so at the time either we send the data or receive the data
(6) These hub devices are very costly so this is limited used we have another best alternative of these devices

What are the switches?


Switches are an also like as Hub but it is more advance than hub it is also a star topology based device which connects multiple of computers and share their data, in the switches we do not face data broadcasting problem because this device is made keeping this in mind that there are not transfer unwanted data to another computer

But we transfer data with the help of hub than we face a big problem to broadcast this data to other computers but switches are more advance with respect to the hub when we transfer data through the switches then a MAC the address is required to send this data

So the switches are more useful than a hub because it provides more facility in the switches when we connect and computer devices then first of all then send a data packet to find the connected device MAC address after this process the switch gives the information to the user about the this device and after the approval of the user, we can easily transfer data from one computer to another computer
In the switches, there are many paths that are defined to transfer the data from one computer to another computer in the switches there are a define path are assign to a particular port so when we transfer file from one port to another port then our data is not collapsed or not collide to another data so it improves the speed of data transferring

In the hub when we transfer file then it data goes to another computer for some common path then some time they give us error and our file is transferred to the wrong person but in the switches the sanded data goes to the right person.

Hub vs switches types and definition


What is proxy server?

Proxy server | Types | In app detection
Proxy server | Types | In app detection 


Proxy server work as service provider between the user and source, when we use internet on the device then an IP address is required to access our data this IP address is the identity of the device and any one can track our activity on the device so to hide this IP address a server is used this server is called proxy server

Proxy server work as VPN (virtual private network) but is not fully as VPN, Proxy server are made only for specific website, apps, Browser we can access only limited data with the help of proxy server, but with the help of VPN we can access any website, apps, browser and other things

So we can say that VPN is more powerful than proxy server but in this article we can talk about only proxy server if you want to what is VPN and how to it work in networking then just click on the below link and see the all detail about VPN.

                                      Clickhere







Proxy server | Types | In app detection


What is boot loader?


Android bootloader unlock | Kernal in operating system
Android bootloader unlock | Kernal in operating system 


Boot loader is programming software which helps us to prevent the installation of unwanted software in the device most of the mobile manufacture company not give the permission to unlock the boot loader directly because it is dangerous for our device.

If we unlock legally the boot loader of the device then we take permission of the give device developer if we unlock the boot loader without any permission with the help of third party apps then we faces many problems.

If we want to install custom ROM in our device then it is necessary to unlock the boot loader of the device, without unlocking the boot loader we cannot change and customise the software of the device
Most of the mobile manufacture company not give permission to change their software so they lock the boot loader of the device and if we want to unlock this boot loader then we get to permission with the developer.

After the unlocking the boot loader we can many changes in our device such as we can install custom ROM and configure the software of the device our desire level but after the unlocking the boot loader the security of the device are reduces and unwanted software and malware may be installed in our device without our permission so this is the big reason company did not give the permission to unlock the boot loader.

What will we do on the device after unlocking boot loader?


There are many things we can do after the unlocking the boot loader on the device, most of the user unlock the boot loader to Root the devices, because after the unlocking the boot loader of the device t can be easily rooted, in the rooted device we can use moded application or other software which are blocked by our security system.

But we cannot suggest to you to root your device because after the rooting of the device there are many viruses and other malware can install in our device without our permission so we don’t use rooted device because this is harmful for our privacy.

If we want to use rooted device to run such programs then we do not save our personal data such as Photos, mail, Bank details and other private information on this device we should use rooted device when our personal data is not save on this device because after the rooting of the device the security of the system is destroyed so any malware software steal our personal data.

What is kernel?


Kernel is a programming software which is use to interaction between hardware and software of the device, the kernel of the device is decided how much resources are provided to the software such as RAM processor and other things.

Kernel is the part of the Operating system which operates different software on the devices, in our device there are many software Run the different software are consume different resources so to control on the software or apps a program is required this program is kernel

In our device we can do work with two types


(a)User mode
(b)Kernel mode

(a) User mode


In this section if we want to directly run our files and other program without system interface then we can do it this is called user mode, in this mode we can check all the detail before the run of file and all the things is right then we can procedure in the next step.

(b) Kernel mode


In this mode most of the software and apps are running with the help of kernel because it provide resources to their requirement, Kernel is work as leader of all programs.


Android bootloader unlock | Kernal in operating system


What is root


Root word for android | Definition | Time taken
Root word for android | Definition | Time taken


Root is a process which help us to install the mod application and other software, In our phone there are many apps and software are installed these software and apps are legal to use and there are no any Malware (virus) are attached with these apps but if we want to use those apps which is not directly use in our phone then first of all we root our phone then we can use mod applcation.

How to Root our phone


The rooting process are different for different device but in this article we discuss those method which follow by all devices, To root our mobile we need two application which is Root checker and King Root, Root checker is easily available on Play store so we can install this app with the help of play store the another app is root checker but it is not available on play store because the play store consider this app as a malware (virus) so it is not available on play store

To install the king root app first of all go the official site of king root app which is www.kingroot.net In this site we download the King root app which is easily available on site so download the latest version of king root app and install this app

After the doing above process just open this open and click on advance setting option and after this process click on the Get root button then our phon e will gone on the rooting process this process can take some time so we take patient and if the rooting process is not continue the we follow some steps the get to the root our phone

How to do before the rooting process


Step-1


First of all go to the google play store and click on three lines here we click on the Play protect option and OFF the Scan apps and app detection option

Step-2


After doing the above process go to the setting and click on the security option here we enable the unknown source option and device administrator option

Step-3


In this step go to the setting and click on the Accessibility here we click on the services after this process there are many settings are shown but we ON the king root option and save the settings

Step-4


Under this step we go to the Storage section in the setting and clear the caches data of the device because some of the case these caches data are stopping the service of king root app so we clear the caches data of the device after this process our device is available to rooting process so go to the king root app and root the phone with the help of above information.


Some important facts of rooting 


If we use mod application in our phone then we can use this application with two types, the first method to use mod apps in our phone to install virtual space or their related apps and make a clone app of those apps which are moded.

In the virtual space the moded application can easily run but some cases when we use mod apps using the virtual space then they do not work properly this is due to our phone security system because our mobile not allowed to use mod app and other software which infected our mobile so to use these software we root our device



Root word for android | Definition | Time taken


What is RAM


what is RAM
RAM | statics and dynamic RAM | SRAM and DRAM



RAM is a memory but it is not a storage memory the full form of RAM is random access memory, RAM is used in different types of mobiles or PC, when we install any software or apps on the mobile then they are not install on the RAM this file install in the internal memory or SD card, When we open any apps on the mobile then a soft copy of this application is come on the RAM and run this platform, In the PC or mobile the RAM and CPU are continuously transfer their data and allow to run programs on the RAM, This memory is volatile memory and store data till then when we stop the device, After the switch off the device the data on the RAM is vanished because RAM is made for only processing of data and run the apps and other programs

Types of RAM


There are mainly two types of RAM
1. Statics RAM
2. Dynamic RAM

Statics RAM (SRAM)


Statics RAM is also called SRAM, in the statics RAM to store a one bit data there are six transistor or MOSFET are use, the full form of MOSFET is metal oxide semiconductor field effect transistor this is a semiconductor device and use various of devices The main purpose of statics RAM is to store cache data, After the switch of the device the data on the statics ram will be deleted, the statics RAM is expensive but it is faster and consume less resources

Dynamic RAM (DRAM)


Dynamic RAM is also called DRAM, in this RAM to store one bit data there are one transistor and a capacitor is used, In the DRAM transistor act as switch and capacitor act as charge container, this RAM is less costly so this RAM is produce over the large scale this RAM is also volatile and store data till than when we OFF the device, After the switch off the device the data on the DRAM is completely vanish so we can not use this memory as a storage memory.


RAM | statics and dynamic RAM | SRAM and DRAM


What is pixel



What is pixel | megapixel | Resolution
What is pixel | megapixel | Resolution


The smallest part of the photos which repeat us and make a complete photo is called pixel, the word pixel are made with the combination of two words which is picture+element the quality of picture are depend on the pixel if the number of the pixel in the image is more then the quality of the image is more, the quality of the image is not depend only on the pixel there are many elements are required which make an image perfect but in this article we know about the pixel.

If we have an image and we see this image in different devices then see see many differences on the image, this differences is due to difference in pixel, in our PC 72 ppi pixel is used which is enough for PC but in the printers 300 ppi pixel are used because in the printer we take photos, photocopy, Banners and other images so in the printer the pixel are more than monitor

Megapixel in phones camera


We know about the mega pixel with the help of an example suppose we have a square area and there are 1 million (10 Lack) dots (pixel) the give area then it represented 1 megapixel camera in the one megapixel camera there are 1152 pixel along the length and 864 pixel along the width similarly in the two megapixel camera there are 1600 pixel along the length and 1200 pixel along the width and similarly this process on the other higher megapixel camera

What is resolution


The total number of pixel in our phone is called resolution of the device, in the mobile phone there are many types of pixel are arranged so the resolution of the phone and other devices are different, To understand the resolution of the phone we take an example suppose we have a phone which in landscape mode then the many doted point are plotted along the horizontal line and along the vertical line so total number of dots (pixel) are calculated by multiplying by Row and column pixel so we find the total number of pixel in the device
In the below there are example of resolution of some screen

Screen size           Screen resolution


   4.7                         750*1334
   5.7                         1440*2560
   5.5                         1080*1920
   9.7                         1536*2048

What is pixel | megapixel | Resolution